FAQs

Pricing

It would depend on several things as there are different levels of service and our brochure gives a comprehensive explanation of all levels of service. Would you like us to send it to you?

For now, here is an example of a basic set-up with 1 server and 10 PCs.

We can send you a comprehensive brochure if you like that will itemise all the services for both Levels of the NSSP system and also an explanation of the casual service we can offer.

We have a cooling-off period of 7 days after signing and the subscription and a minimum of 6 months is our subscription period.

All our levels of service allow for site visits and the cost is either absorbed in our NSSP monthly subscription (depending on the distance, the service performed and the level of the subscription).

Please ask for a copy of our service brochure.

Services

We have been operating since 1983 and our clients collectively have thousands of network devices. Our engineers have Bachelor’s degrees, certifications and collectively 90+ years of experience between them. CV’s available on request.

Anyone who needs help with IT networking or cloud operations is someone we can help – we have started people in the early stages of their businesses and helped them grow to big networks.

We can definitely help with anything that will merge with your existing systems. You need to carefully manage anything that is going to possibly impact your systems. We can also advise and suggest compatible products.

We work with Servers that are Windows-based servers. However, we can monitor Unix, Linux, Apple Mac etc

If you are a subscriber of the NSSP we monitor your network 24/7/365 and once a month we report all the activity that was detected and dealt with.

Yes, you can become a casual client and we will track your activity and costs in case your usage is high and we can see that you would be better off signing to a package. There is no obligation but we like our clients to have the option if they can save some money.

Only to our NSSP subscribers.

Only if you need it. We do assist you to plan for the redundancy of machines as they age but it is your decision and also a great question for your accountant.

We can buy everything you need from our wholesalers including warranty management, send them to our workshop to build the software packages before installation, and deliver them to your site. We charge a set fee of 10% for acquisition.

All purchases are preceded by an accepted quote by you and payment is dependent on your service level.

We have a full contingency plan for any emergency in our office – so we can be ready to help you if your office is also threatened by the emergency. if you are a subscriber we will have designed a contingency plan to keep you operating and recover all your data.

We will then be available to assist you through the stressful exercise of dealing with your insurance company.

We would be delighted to advise you of what is the best way forward and what would suit your operation and budget.

Give us a call to see how we can help you.

We are based in Brisbane, Australia and we do not outsource our engineers from outside Australia.

No, we can give you a choice and we can also add the cloud as part of your network system if you need it.

Privacy and Security

We do not hold any information owned by you, including passwords – however, we can help you if you lose them.

We do not discuss anything or follow any instructions from your staff unless you have nominated them as an approved contact.

We do not use Cookies – so no third party can access your information.

We have included a Privacy Policy on the Website and it clearly states that we hold your information exclusively to Hall Computer Services and we will follow your instructions if you decide that you do not want it held anymore. We do not share your information with any third party and we do not allow external access to it.

The Australian Cyber Security Centre has listed eight mitigation strategies that they recommend to businesses to set in place within their systems.

We implement and manage security systems for our clients so we also employ them to protect our client’s systems from compromise. The Essential Eight strategies are designed to protect Microsoft Windows-based internet-connected networks.

For more information please see:

https://www.cyber.gov.au/acsc/view-all-content/essential-eight